| 研究生: |
張景超 Chang, Ching-Chao |
|---|---|
| 論文名稱: |
符合EPCglobal Gen2協定的RFID碰撞避免演算法之實作 Implementation of RFID Anti-Collision Algorithm for EPCglobal Gen2 Protocol |
| 指導教授: |
陳文字
Chen, Wen-Tzu |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 電信管理研究所 Institute of Telecommunications Management |
| 論文出版年: | 2012 |
| 畢業學年度: | 100 |
| 語文別: | 英文 |
| 論文頁數: | 56 |
| 中文關鍵詞: | 射頻辨識 、碰撞避免 、實作平台 |
| 外文關鍵詞: | RFID, anti-collision, implementation |
| 相關次數: | 點閱:176 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,無線射頻辨識系統(RFID)已經成為重要的基礎科技。它是一種快速、安全、高效的辨識程序,深深影響了供應鏈管理、收費繳費、圖書館、電子護照、購物等諸多領域。射頻辨識系統處於一個無線傳輸的環境中,當讀取器必須同時辨識多個標籤時,會產生資料碰撞而無法辨識的情況,因此如何避免資料傳送的碰撞問題(Anti-collision),一直是學者們努力的方向。然而,碰撞避免的相關研究大部分僅限於系統模擬階段,鮮少有實作方面的研究。
本研究建立了一套RFID實驗平台系統,包括防碰撞演算法的運作、程式的編譯和燒錄、數據收集的方法等。我們選擇眾所周知的Schoute演算法與最簡略的Low Bound演算法,實作並比較其結果。實驗結果與其它研究的模擬結果大致相符。因此,我們建立的平台在實際環境中是可運行的。未來,後續的研究者可以提出更有效率的防碰撞演算法,並使用這個實驗平台來驗證其性能。
In recent years, radio frequency identification (RFID) has become an important infrastructure technology. It is a fast, secure, and efficient identification procedure that influences many various applications, such as supply chain management, toll-payment, libraries, e-passports, and shopping. RFID technology works in a wireless environment in which a reader has to identify many tags at the same time. This usually leads to collisions and unidentified data in reading process. Therefore, one always strives to solve such an anti-collision problem. However, most research effort is usually limited to the stage of system simulation. Although the simulation is actually performed in accordance with the protocol, it is still not enough to explain the reliability in the real work.
This research builds a RFID platform, including work of anti-collision algorithm, programs of compilation and burning, method of data collecting, and so on. We select a well-known algorithm (Schoute’s Method) to implement and compare with a base line algorithm (low bound method). The experiment results are quit consistent with that from other works of research. Thus, the experiment platform we built is reliable in actual work. Future research can focus on more efficient anti-collision algorithms, and use this experiment platform to verify the algorithms.
[1] Jia Zhai and Gi-Nam Wang, “An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags”, ICCSA 2005, LNCS 3483, pp. 702–711, 2005.
[2] Rakesh Kumar, “Interaction of RFID Technology and Public Policy”.
[3] ISO/IEC 18000-1.Information technology AIDC techniques–RFID for item management–air interface, part1–generic parameters for air interface communication for globally accepted frequencies. http://www.iso.org.
[4] Ari Juels. “yoking-proofs for RFID tags.” In Ravi Sandhu and Roshan Thomas, editors, Workshop on Pervasive Computing and Communications Security–PerSec 2004, pages 138–143, Orlando, Florida, USA, March 2004.IEEE.
[5] Ranasinghe, D.C., Engels, D.W. and Cole, P.H. “Security and privacy solutions for low-cost RFID systems,” Intelligent Sensors, Senso Networks and Information Processing Conference, 2004. Proceedings of the 2004,14-17 Dec. 2004 Page(s):337 – 342
[6] Don R. Hush and Cliff Wood, “Analysis of Tree Algorithm for RFID Arbitration,” In IEEE International Symposium on Information Theory, 1998.
[7] C. Law, K. Lee, and K.-Y. Siu, “Efficient memoryless protocol for tag identification.” In Proceedings of the 4th International Workshop on Discrete Algorithm and Methods for Mobile Computing and Communications, p. 75-84, Boston, MA, August 2000.
[8] Vogt, H. “Efficient Object Identification with Passive RFID Tags.” In international Conference on Pervasive Computing, LNCS, Springer-Verlag 2002.
[9] Vogt, H. “Multiple Object Identification with Passive RFID Tags.” Systems, Man and Cybernetics, 2002 IEEE International Conference on Volume 3, p.6-9 Oct. 2002.
[10] Jia Zhai, Gi-Nam Wang, “An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags.” Computational Science and Its Applications – ICCSA 2005: International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV, Volume 3483, p.702-711, Apr. 2005.
[11] Wen-Tzu Chen and Wen-Bin Kao, “A Scheme for Improving the Efficiency of RFID Anti-Collision in EPCglobal Generation 2 Protocol”, master thesis, NCKU, June 2008.
[12] K. Finkenzeller, RFID Handbook Radio Frequency Identification Fundamentals and Applications. John Wiley & Sons, 2000.
[13] V. Anatharam, “The stability region of the finite-user slotted aloha protocol”, IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 535-540, May 1991.
[14] J. E. Wieselthier, A. Ephremides, and L. A. Michaels, “An exact analysis and performance evaluation of framed aloha with capture”, IEEE Trans. Commun., vol. 37, no. 2, pp. 125-137, Feb. 1989.
[15] H. Vogt, “Efficient object identification with passive RFID tags”, Apr. 2002, pp. 98-113.
[16] F. C. Schoute, “Dynamic frame length aloha”, IEEE Trans. Commun., vol. 31, no. 4, pp. 565-568, Apr. 1983.
[17] Zhonghua Li, Chunhui He and Hong-Zhou Tan, “An Enhanced Tag Estimation Method Applied to Tag Anti-collision Algorithm in RFID Systems”, International Conference on Information Science and Technology March 26-28, 2011.
[18] Wen-Tzu Chen and Guan-Hung Lin, “An Efficient Anti-Collision Method for Tag Identification in a RFID System,” IEICE Transactions on Communications, volume E89-B, number 12, pp. 3386-3392, December 2006.
[19] EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz Version 1.1.0
[20] Data Sheet-AS3992 UHF RFID Single Chip Reader
[21] MCS® 51 Microcontroller Family User's Manual, February 1994, Publication number 121517, Intel Corporation
[22] XILINX, “Spartan-II 8-bit Microcontroller Solutions -Customer Tutorial”, March 2000
[23] Datasheet -MAX3232CPE - 3.0V to 5.5V, Low-Power, up to 1Mbps, True RS-232 Transceivers Using Four 0.1uF External Capacitors - Maxim Integrated Products
[24] Jun-Bong Eom, Tae-Jin Lee, “Accurate Tag Estimation for Dynamic Framed-Slotted ALOHA in RFID Systems,” IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 1, JANUARY 2010, pp. 60-62.
[25] Bo Li, Junyu Wang, “Efficient Anti-Collision Algorithm Utilizing the Capture Effect for ISO 18000-6C RFID Protocol”, IEEE COMMUNICATIONS LETTERS, VOL. 15, NO. 3, MARCH 2011, pp. 352-354.